Resources | SecureWorld

Understanding and Protecting Kerberos—the Soft Target of Cybersecurity

Written by SecureWorld News Team | 11 PM Z

With the introduction of Active Directory more than 20 years ago, the Kerberos protocol provided a new approach to security and identity management. But new, sophisticated attack methods and the shift to the cloud have left Kerberos—an authentication protocol used to verify the identity of a user or host—a highly vulnerable target.

In this webcast, Elad Shamir and Sean Deuby of Semperis will provide guidelines for IT and security teams in guarding Kerberos from cyberattacks:

•  How the Kerberos authentication protocol works
•  Common Kerberos attack methods
•  How to combat Kerberoasting attacks
•  Mitigating Silver Ticket and Golden Ticket attacks
•  Understanding and mitigating the dangers of Kerberos unconstrained delegation and authentication coercion

Attendees are eligible to receive 1 CPE credit.